export EDITOR=mcedit
server_tokens off;
client_max_body_size 100m;
version: '2'
services:
proxy:
image: jwilder/nginx-proxy
ports:
- 0.0.0.0:80:80
- 0.0.0.0:443:443
volumes:
- /var/run/docker.sock:/tmp/docker.sock
- ./certs/:/etc/nginx/certs:ro
- ./jira-nginx.conf:/etc/nginx/vhost.d/jira.local.net
networks:
- proxy
jira:
image: q2digger/jira-software-eap:latest
ports:
- 0.0.0.0:8081:8080
volumes:
- _jiradata:/var/atlassian/jira
- _jiralogs:/opt/atlassian/jira/logs
- ./jira.config:/opt/atlassian/jira/conf/jira.config
- ./certs/:/ssl/root
networks:
- jira
- proxy
environment:
JVM_MINIMUM_MEMORY: '2048m'
JVM_MAXIMUM_MEMORY: '4096m'
CATALINA_CONNECTOR_PROXYNAME: 'jira.local.net'
CATALINA_CONNECTOR_PROXYPORT: '443'
CATALINA_CONNECTOR_SCHEME: 'https'
VIRTUAL_HOST: 'jira.local.net'
VIRTUAL_PORT: '8080'
volumes:
_jiradata:
_jiralogs:
networks:
jira:
proxy:
# Fail2Ban configuration file
#
# Author: Cyril Jaquier
#
#
[INCLUDES]
before = iptables-common.conf
[Definition]
# Option: actionstart
# Notes.: command executed once at the start of Fail2Ban.
# Values: CMD
#
actionstart = <iptables> -N f2b-<name>
<iptables> -A f2b-<name> -j <returntype>
<iptables> -I <chain> -p <protocol> --dport <port> -j f2b-<name>
# Option: actionstop
# Notes.: command executed once at the end of Fail2Ban
# Values: CMD
#
actionstop = <iptables> -D <chain> -p <protocol> --dport <port> -j f2b-<name>
<iptables> -F f2b-<name>
<iptables> -X f2b-<name>
# Option: actioncheck
# Notes.: command executed once before each actionban command
# Values: CMD
#
actioncheck = <iptables> -n -L <chain> | grep -q 'f2b-<name>[ \t]'
# Option: actionban
# Notes.: command executed when banning an IP. Take care that the
# command is executed with Fail2Ban user rights.
# Tags: See jail.conf(5) man page
# Values: CMD
#
actionban = <iptables> -I f2b-<name> 1 -s <ip> -j <blocktype>
# Option: actionunban
# Notes.: command executed when unbanning an IP. Take care that the
# command is executed with Fail2Ban user rights.
# Tags: See jail.conf(5) man page
# Values: CMD
#
actionunban = <iptables> -D f2b-<name> -s <ip> -j <blocktype>
[Init]
logLevel = DEBUG
logtarget = /var/log/fail2ban.log
2019-08-20 21:26:31,218 fail2ban.jail [16029]: INFO Creating new jail 'nginx-nokiddies'
2019-08-20 21:26:31,218 fail2ban.jail [16029]: INFO Jail 'nginx-nokiddies' uses poller
2019-08-20 21:26:31,219 fail2ban.jail [16029]: INFO Initiated 'polling' backend
[DEFAULT]
ignoreip = 127.0.0.1/8
ignorecommand =
bantime = 600
findtime = 600
maxretry = 3
[nginx-nokiddies]
enabled = true
filter = nginx-nokiddies
port = http,https
logpath = /var/log/nginx*/*access.log
action = iptables-multiport[name=NiKiddies, port="http,https"]
findtime = 3600
bantime = -1
maxretry = 2